Not sure what to include in your resume? Do you want to get selected for a first round or second round campus interview with a great company? Are you an experienced professional with 10+ years of experience and have a resume that already looks like a novel, but hasn’t turned out to be a best seller? In today’s changing job market, you need to stand out among a sea of hundreds of LinkedIn job applicants all competing for that opening. Join our session on the purpose of a resume, what information you should include, and how to get your resume recognized.
Tobi West, CISSP, GCFE
Professor West is Department Chair of Cybersecurity and Computer Information Systems at Coastline College and she teaches cybersecurity and digital forensics courses. She is also a PhD student at Dakota State University, studying in the Cyber Defense program with a research emphasis on digital forensics and data privacy. She enjoys organizing CyberTech Girls events and GenCyber Girls camp activities for middle school and high school girls to build career pathways and develop their interest in digital forensics, cybersecurity, and technology.
Anna Carlin, CISA
Anna is a CIS Instructor and Director for the FC Hornet Security Education Center at Fullerton College. She teaches Introduction to Cyber Security, Network Security, Ethical Hacking, Operating Systems Security, Personal Computer Security, and Introduction to Information Systems in the Business and CIS Division, Computer Information Systems Department. Anna serves as co-Principal Investigator on a National Science Foundation grant to support workforce and curriculum development in digital forensics and incident response. She also has over 15 years of experience in IT audit, software development, and operations management. Anna currently serves as a Director and Academic Relations Chair for ISACA Los Angeles.
6:00 PM – 7:30 PM: Webinar Session
Time Details: 1 CPE Credit for the webinar
*Virtual education events (e.g. Webinars) CPEs
The chapter is not issuing CPEs for this event. CPEs should be self-reported, if necessary.
ISACA reserves the right to alter or delete items from the program in the event of unforeseen circumstances. Material has been prepared for the professional development of ISACA members and others in the IT audit, control, security, and governance community. Neither the presenters nor ISACA can warrant that the use of material presented will be adequate to discharge the legal or professional liability of the members in the conduct of their practices. All materials used in the preparation and delivery of presentations on behalf of ISACA are original materials created by the speakers, or otherwise are materials which the speakers have all rights and authority to use and/or reproduce in connection with such presentation. Subject to the rights granted in all applicable copyrights, trade secrets, and other intellectual property rights in the materials are and remain with the speakers.
*Please note: unauthorized recording, in any form, of presentations and workshops is prohibited.
*Permission to be Photographed, Videotaped, and Recorded
By attending this event, the registrant grants permission to be photographed, videotaped, and recorded during the event (in person or virtual). The resultant photographs, video recordings and virtual event recordings may be used by ISACA for future promotion of ISACA’s educational events on ISACA’s web site, on social media and/or in printed promotional materials, and by attending this event, the registrant consents to any such use. The registrant understands any use of the photographs, video recordings and virtual event recordings will be without remuneration. The registrant also waives any right to inspect or approve the aforementioned use of any photographs, video recordings and virtual event recordings now or in the future.